-
1
-
-
78651397644
-
-
Annual Report PandaLabs 2009, http://www.pandasecurity.com!homeusers/ security-info/tools/reports/.
-
(2009)
Annual Report PandaLabs
-
-
-
2
-
-
76649141154
-
Automatic generation of string signatures for malware detection
-
Brittany, France, Sep.
-
K. Griffin, S. Schneider, X. Hu and T.-c. Chiueh. Automatic generation of string signatures for malware detection. In Proceedings of RAID 2009, pages 101-120, Brittany, France, Sep. 2009.
-
(2009)
Proceedings of RAID 2009
, pp. 101-120
-
-
Griffin, K.1
Schneider, S.2
Hu, X.3
Chiueh, T.-C.4
-
3
-
-
23744485744
-
Testing malware detectors
-
Boston, MA, USA, ACM Press, July
-
M. Christodorescu and S. Jha. Testing malware detectors. In Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis 2004 (ISSTA'04), pages 34-44, Boston, MA, USA, ACM Press, July 2004.
-
(2004)
Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis 2004 (ISSTA'04)
, pp. 34-44
-
-
Christodorescu, M.1
Jha, S.2
-
4
-
-
48349087890
-
Code obfuscation techniques for metamorphic viruses
-
J. Marie, Borello and L. Mé. Code obfuscation techniques for metamorphic viruses. Journal in Computer Virology, Volume 4, pages 211-220, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, pp. 211-220
-
-
Borello, J.M.1
Mé, L.2
-
8
-
-
54849442042
-
Constructing malware normalizers using term rewriting
-
Walenstein, R. Mathur, et al. Constructing malware normalizers using term rewriting. Journal in Computer Virology, Volume 4, pages 307-322, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, pp. 307-322
-
-
Walenstein, R.M.1
-
9
-
-
34047180006
-
Code normalization for self-mutating Malware
-
D. Bruschi, L. Martignoni, M. Monga. Code normalization for self-mutating Malware. Journal in IEEE Security & Privacy, Volume 5, pages 46-54, 2007.
-
(2007)
Journal in IEEE Security & Privacy
, vol.5
, pp. 46-54
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
10
-
-
33746406796
-
Detecting self-mutating malware using control-flow graph matching
-
Nov.
-
D. Bruschi, L. Martignoni, M. Monga. Detecting self-mutating malware using control-flow graph matching. In Detection of Intrusions and Malware & Vulnerability Assessment, Volume 4064, pages 129-143, Nov. 2006.
-
(2006)
Detection of Intrusions and Malware & Vulnerability Assessment
, vol.4064
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
13
-
-
37849017546
-
Mining specifications of malicious behavior
-
Dubrovnik, Croatia
-
M. Christodorescu, S. Jha and C. Kruegel. Mining specifications of malicious behavior. In Proceedings of the ACM SIGSOFT symposium on the foundations of software engineering, pages 5-14, Dubrovnik, Croatia, 2007.
-
(2007)
Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
14
-
-
74049142314
-
Large-scale malware indexing using function-call graphs
-
Chicago, Illinois, USA
-
X. Hu, T.-c. Chiueh and K. G. Shin. Large-scale malware indexing using function-call graphs. In Proceedings of CCS 2009, pages 611-620, Chicago, Illinois, USA.
-
Proceedings of CCS 2009
, pp. 611-620
-
-
Hu, X.1
Chiueh, T.-C.2
Shin, K.G.3
-
15
-
-
78651394211
-
-
PeiD 0.95, http://www.peid.info/, 2010.
-
(2010)
PeiD 0.95
-
-
-
16
-
-
78651400129
-
-
UPX 3.05, http://upx.sourceforge.net/, 2010.
-
(2010)
UPX 3.05
-
-
-
17
-
-
78651400974
-
-
IDA Pro 5.5, http://www.hex-rays.comlidapro/, 2010.
-
(2010)
IDA Pro 5.5
-
-
-
19
-
-
70350695504
-
-
No Starch Press, first edition, Aug.
-
Chris Eagle. The IDA Pro book, No Starch Press, first edition, Aug. 2008.
-
(2008)
The IDA Pro Book
-
-
Eagle, C.1
-
21
-
-
78651403866
-
-
VX Heavens, http://vx.netlux.org/, 2010.
-
(2010)
-
-
-
23
-
-
78651401150
-
-
md5 checksum, http://www.etree.org/md5com.html, 2010.
-
(2010)
md5 Checksum
-
-
|